It looks like your most recent change rebased the base revision. That makes it very hard to see which changes are from you and which aren't. Could you please either un-rebase it or, if that's not possible, open a new review?
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Aug 30 2020
Using two completely separate functions reduces the scope of error. Also prevent any mutation to the current code path for not locked vnodes, while allowing it to work for locked vnodes.
Aug 28 2020
- updated sys/kern/vfs_cache.c to reduce code duplication with vn_fullpath_dir
- some trivial changes
Aug 20 2020
Regarding code duplication in vn_fullpath_dir_locked:
I modified vn_fullpath_dir(and removed vn_fullpath_dir_locked) for optionally locked vnode here in git commit: https://github.com/shivankgarg98/freebsd/commit/418c1c2a6de9989fe7a541f6111ee2c3f2786c7b
It works fine NFSv4=3 case but somehow breaks nfsrvd_open to result in an error.{and hence can't open/create a regular file from client}.
Using two completely separate functions reduces the scope of error. Also prevent any mutation to the current code path for not locked vnodes, while allowing it to work for locked vnodes.
follow-up on suggested changes.
Aug 19 2020
This is a much better locking strategy. However, there's a lot of duplicated code. Could you maybe combine the _locked with the original functions, so there wouldn't be so much duplication?
Aug 4 2020
removing unlocking/relocking implementation for vnode for auditing path, instead, define separate functions in vfs_cache.c for locked vnode as argument.
Jul 30 2020
Thanks for all suggestions. I have incorporated them into my code. There is just a directory vnode unlocking/relocking issue not done yet.
In summary, locking and unlocking vnodes in this code is dangerous
and I am not in a position to make sure what you do is safe.
Jul 29 2020
follow up on changes suggested by asomers@
Jul 28 2020
Jun 27 2019
Presuming all the testing works :-)
May 11 2019
Apr 1 2019
Minor comment - results of real-world testing of cracking resistance, both for the 11.x defaults and for those proposed by D15713.
Sep 1 2018
All comments are minor.
Aug 20 2018
Any chance of this being moved forward in time for the 12 branch?
Aug 16 2018
I'm hopeful that this fixes style, and other suggestions from delphij.
Aug 9 2018
Updates remaining man styles.
Aug 3 2018
In fairness, this example pre-dates the crypt_r in FreeBSD by 4+ years.
Aug 2 2018
Aug 1 2018
Jul 31 2018
This update covers the linting, and simplified example code in the libcrypt manpage.
Jul 28 2018
Could you please split the proposed change to smaller pieces, so it would be easier to review?
Jul 27 2018
Jul 16 2018
There are a bunch of style issues with crypt.3. Can you run "mandoc -Tlint" and textproc/igor (from ports/packages) on it? It should give you some feedback where the problems are. For example, man pages need a line break after a sentence stop.
Jun 11 2018
Jun 10 2018
Fix loop always executing twice (in pw+pam_unix), with leaky memory.
Jun 9 2018
Fix accent on David's name, per imp feedback.
May 8 2018
Mar 13 2018
Jul 7 2017
Was already committed in r445228.
Jun 30 2017
Jun 11 2017
Mar 22 2016
Jan 19 2016
As been committed as rS294326 (discussed with des)
Jan 4 2016
Jan 3 2016
Oct 22 2015
Apologies, I intended to Commandeer -> Close.
Oct 8 2015
This is already in the tree (apparently no one approved it though).
Oct 4 2015
Committed as r288669.
Oct 3 2015
Results from exp-run (PR 2013394) are out:
Exp-run results on head i386:
http://package23.nyi.freebsd.org/jail.html?mastername=headi386PR203394-default
Sep 28 2015
Peter Holm has kindly provided some testing:
Sep 26 2015
In D3463#77043, @delphij wrote:
...
Will it be possible that you can provide some basic test data, for instance, a few world stone runs on memory disk, and see how exactly the impact would be? It would be easier to convince people when you have first hand data, and although we know others have already do some testing, it's important to know if the same applies on FreeBSD because it's likely that the experiments were not on FreeBSD, and the result may be different.
Sep 25 2015
I'll patch my laptop and have started a clean build so I'll see if there would be visible performance/other impact after running with it for a few days.
Aug 29 2015
Aug 28 2015
Aug 27 2015
+1
Aug 23 2015
In D3463#70669, @imp wrote:What's the performance impact?
We should investigate that the -fstack-protector-strong triggers the same as -fstack-protector-all:
What's the performance impact?